Exposing Risks and Opportunities of Mobility & Consumerization in EducationJamie Haggett, Global Director – End User Security, Trend MicroThe explosion of consumer technologies are changing the Information Technology landscape as we know it. While mobility and consumerization can introduce many risks, it also opens up an enormous productivity opportunity that needs to be exploited! Dive into the latest threat landscape as it relates to mobile as well as how security is actually enabling education!Read more >
The explosion of consumer technologies are changing the Information Technology landscape as we know it. While mobility and consumerization can introduce many risks, it also opens up an enormous productivity opportunity that needs to be exploited! Dive into the latest threat landscape as it relates to mobile as well as how security is actually enabling education!
This presentation will discuss the most recent information on advances within the cybercriminal underground. Discussion will revolve around the different cybercriminal business models used within the underground and how this affects you. From Organized crime to the Mentor/Apprentice models we’ll give you information you need to better understand how the underground economy works.
Mid Market organizations face even greater security threats than before. Their organizational growth and assets – be it intellectual property, PII or credit card data – increases the risk of a breach or targeted attack. Limited IT staff wearing many hats may find it challenging to keep up with the ever-changing threat landscape.
Join us for this webinar and gain a deeper understanding of the:
· Threats that Mid Market firms face across physical, virtual and cloud environments
· Three security steps that SMB firms can implement to enhance their security posture today
· Advanced Persistent Threats aimed at higher-risk Mid Market firms and how to overcome
· Resources and expertise available to augment organizational security
Comware CEO Charles Carlson in this webinar invites guest JD Sherry to share his security expertise with Mid Market businesses as well as protecting state and local governments. JD Sherry, Director of Product and Technology at Trend Micro, has significant mobile and cloud experience in developing secure, scalable IT solutions designed to meet strict compliance and payment card regulations.
This webinar will review the new PCI Guidelines published on February 7, 2013, with a focus on relevant DSS requirements for cloud computing. In this discussion, we will review the implications of the newly published PCI Guidelines and recommend best practices for businesses to achieve compliance when deploying in the cloud.
Attendees should expect the following:
•A summary of the implications of new PCI Guidelines for cloud computing.
•A review of requirements that are fulfilled by Infrastructure as a Service providers and specifically by Amazon Web Services (AWS).
•Practical guidance on best practices for clients to address their requirements for compliance.
Join this panel of experts from Accuvant, Amazon Web Services and Trend Micro for a concise roadmap of how to navigate PCI compliance in cloud computing's shared risk model.
The security and risk landscape will be more complex in 2013. Are you concerned about protecting intellectual property and valuable company information? What are the gaps that cybercriminals use to steal information, profit, and sabotage operations? And what can organizations of all sizes do to use effective solutions to protect themselves?
Please join Jon Clay, Sr. Manager of Core Technology at Trend Micro, for this LIVE webinar. Jon will outline the key security threats from 2012 and discuss what CTO Raimund Genes, along with the 1,100 threat researchers at Trend Micro, deem as the highest security risks for 2013.
Topics will include:
•Security threats to businesses, our digital lifestyle and the cloud
•Effective solutions to protect your organization
•Safeguarding your customers’ interests
•Establishing and implementing IT usage
The Mobile Security Workshop is a technical presentation delivered via webcast targeted for IT management (specifically clients that have OfficeScan or are looking into purchasing OfficeScan) to familiarize themselves with the features and benefits of Trend Micro’s Mobile Device Management solution (TMMS).
In this webinar, we will illustrate how to deploy the two most popular Mobile OS brands (iOS and Android devices) and the technical steps involved to get started.
APTS have long relied upon information security tunnel vision in order to maintain persistence within agency and corporate networks. We must spin the chess board and learn from the advanced tactics utilized in cyber campaigns. This webinar will discuss the evolution of the cyber kill chain and the relevant risk management practices that are best suited to mitigate the threat to your enterprise.
As companies journey into virtualization, they discover requirements from the nature of virtualization, as-well-as heightened regulatory requirements put in place because of a virtualized environment. Deep Security meets these requirements and helps a company realize the greatest potential from their virtualization investment.
Cloud infrastructure gets more complex when you add hybrid clouds, using in-house private clouds while dynamically adding capacity through public clouds, such as AWS.
This presentation will cover hybrid cloud strategies and focus on three key components of enforcing security policy across the entire hybrid cloud using a security management and policy framework that spans both private and public clouds.
Key components include:
1) security that supports different variants of the EC2 images
2) a security agent that can be baked into the AWS golden image
3) a management console that integrates with AWS APIs to coordinate visibility and security policies across both private cloud and AWS instances.
As hacking communities grow, gain support from state actors and shift their priorities it is more important than ever to have the right toolset, processes and controls in place to meet them.
Join Jon Clay, Security Technology Expert, as he goes over the most common and insidious hacker attacks and how your organization can strengthen your custom defenses, increase breach and vulnerability assessment and prevent hackers from getting in.